Sökning: "Sidokanalsattack"

Visar resultat 1 - 5 av 7 uppsatser innehållade ordet Sidokanalsattack.

  1. 1. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Linus Backlund; [2023]
    Nyckelord :Public-key Cryptography; Post-Quantum Cryptography; Kyber; Saber; Side-Channel Attack; Power Analysis; Asymetrisk Kryptering; Kvantsäker Kryptografi; Kyber; Saber; Sidokanalsattack; Effektanalys;

    Sammanfattning : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. LÄS MER

  2. 2. A deep learning based side-channel analysis of an FPGA implementation of Saber

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Yanning Ji; [2022]
    Nyckelord :Side-Channel Attack; Deep Learning; Post-quantum Cryptography; Sidokanalsattack; djupinlärning; postkvantkryptering;

    Sammanfattning : In 2016, NIST started a post quantum cryptography (PQC) standardization project in response to the rapid development of quantum algorithms which break many public-key cryptographic schemes. As the project nears its end, it is necessary to assess the resistance of its finalists to side-channel attacks. LÄS MER

  3. 3. Improving deep learning assistedfar-field electromagnetic sidechannelattacks on AES : Effects on attack efficiency from using additive noise and otherdata augmentation techniques

    Master-uppsats, KTH/Mekatronik

    Författare :Axel Zedigh; [2022]
    Nyckelord :;

    Sammanfattning : Profiled side-channel attacks on hardware implemented cryptographic algorithms have been a well-researched topic for the past two decades and many countermeasures against these attacks have been proposed and adopted by the industry. Recently, a new form of far field EM side channel called "screaming channel attacks" have been highlighted. LÄS MER

  4. 4. Advanced Side-Channel Analysis of USIMs, Bluetooth SoCs and MCUs

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Martin Brisfors; [2021]
    Nyckelord :Side Channel Attack; Deep Learning; AES; USIM; Milenage; Screaming Channels; Transformer; Security; Sidokanalsattack; Djupinlärning; AES; USIM; Milenage; Screaming Channels; Transformer; Säkerhet;

    Sammanfattning : The use of deep learning for side channel analysis has shown a lot of success in recent years. Impressive results have been presented by many researchers. However, critics of this approach have voiced concerns about the ad hoc methodologies and bespoke neural network designs used in many presented approaches. LÄS MER

  5. 5. Tor och webbplatsorakel : Konstruktion och utvärdering av webbplatsorakel från DNS-tidtagning i Tor-nätverket.

    Kandidat-uppsats, Karlstads universitet

    Författare :Oscar Andersson; [2021]
    Nyckelord :Tor; The Tor Project; The Onion Router; Website Oracle; Attack; Penetration Testing; Network; Security; Side channel attack; DNS; Timing; Darknet; Dark net; Tor; Nätverksteknik; Attack; Webbplatsorakel; Sidokanalsattack; Penetrationstest; Datasäkerhet; Informationssäkerhet; DNS; The Tor Project; Darknet; Dark net;

    Sammanfattning : This paper discsusses the question: is website oracles in Tor from timing DNS something we have to worry about? This paper builds apon the findings done by Rasmus Dahlberg and Tobias Pulls in thier paper Website Fingerprinting with Website Oracles. A website oracle is a side channel attack that answers the predicate: has this website been visited before? The website oracle is constructed and test are carried out, with great outcome, resulting in that website oracles from timing DNS is not an attack that puts individuals using Tor at risk, but certanly challanges the idea of an anonymity network when such a lot of data can be derived from DNS. LÄS MER